Eprint

Results: 2085



#Item
661Computational complexity theory / Applied mathematics / Cryptography / Mathematics / Message authentication codes / Cryptographic hash functions / VEST

A New Approach to Practical Active-Secure Two-Party Computation 1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-02-14 09:50:59
662Biloxi /  Mississippi / Guilford Young College / Gulfport /  Mississippi / Regatta / Mississippi / Sports in Mississippi / Biloxi Yacht Club

MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions (Full Version) Tore Kasper Frederiksen1 , Thomas Pelle Jakobsen1 , Jesper Buus Nielsen1 , Peter Sebastian Nordholt1 , and Claudio Orlandi1 ?

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-04-29 05:32:11
663

Using Bleichenbacher’s Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA Elke De Mulder1 , Michael Hutter1,2 * , Mark E. Marson1 , and Peter Pearson1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-06-05 13:47:36
    664

    CRYPTANALYSIS OF THE A5/2 ALGORITHM Slobodan Petrovic and Amparo Fuster-Sabater Abstract - An attack on the A5/2 stream cipher algorithm is described, that determines the linear relations among the output sequence b

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2000-10-11 05:03:34
      665

      Attack on A New Public Key Cryptosystem from ISC’02 (LNCSFangguo Zhang1 Shengli Liu2 and Kwangjo Kim1 1 2

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2002-11-21 02:42:12
        666

        What number r of different IVs, and what keystream sequence length l, do we need before this technique can be applied enoug...

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2001-09-11 10:47:24
          667

          Identity Based Authenticated Key Agreement Protocols from Pairings? Liqun Chen1 and Caroline Kudla2?? 1 Hewlett-Packard Laboratories, Bristol, UK

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2004-05-27 09:22:47
            668

            Microsoft Word - ceremony-analysis.doc

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2007-10-17 07:53:09
              669

              In the blink of an eye: There goes your AES key (DRAFT of 28 MaySergei Skorobogatov Christopher Woods

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2012-05-28 11:18:48
                670

                OAEP Reconsidered∗ Victor Shoup IBM Zurich Research Lab, S¨ aumerstr. 4, 8803 R¨ uschlikon, Switzerland

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2001-02-13 04:45:40
                  UPDATE